期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Empirical Studies in Alluvial Streams
1
作者 Levent Yilmaz 《Journal of Geographical Research》 2020年第1期6-8,共3页
Meander flow takes place in one single channel which oscillates more or less regularly with amplitudes that tend to increase with time.Meanders are found in beds of fine sediments with gentle slopes.In this study,effo... Meander flow takes place in one single channel which oscillates more or less regularly with amplitudes that tend to increase with time.Meanders are found in beds of fine sediments with gentle slopes.In this study,effort will be made to investigate meanders’turbulent boundary layer and to improve the present knowledge about the river meandering phenomena.It is assumed that the development of the perturbations which develop into meanders or braids,is longer than the width of the channel.Interaction between the flow and mobile boundaries produces channel patterns which are classified as meandering or braided.It is therefore long compared with the ripples or dunes which cover the bed of such a channel and whose wavelength is shorter than the width of the channel.The variation of resistance to flow and rate of transport of bed material with velocity are discussed briefly and taken into account.Meander flow and meander shear stress distribution of the channel are described.The basis is a steady,two-dimensional model of flow in an alluvial channel with variable curvature.The meander development is described by forcing a travelling,small-amplitude channel alignment wave on the system,and determining the growth characteristics of the wave.Laboratory data are used to verify the formulas. 展开更多
关键词 MEANDER Sediment transport verify data OSCILLATION
下载PDF
Improved Verifiability Scheme for Data Storage in Cloud Computing
2
作者 YANG Xiaoyuan ZHU Shuaishuai PAN Xiaozhong 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期399-404,共6页
In Cloud computing, data and service requests are responded by remote processes calls on huge data server clusters that are not totally trusted. The new computing pattern may cause many potential security threats. Thi... In Cloud computing, data and service requests are responded by remote processes calls on huge data server clusters that are not totally trusted. The new computing pattern may cause many potential security threats. This paper explores how to ensure the integrity and correctness of data storage in cloud computing with user's key pair. In this paper, we aim mainly at constructing of a quick data chunk verifying scheme to maintain data in data center by implementing a balance strategy of cloud computing costs, removing the heavy computing load of clients, and applying an automatic data integrity maintenance method. In our scheme, third party auditor (TPA) is kept in the scheme, for the sake of the client, to periodically check the integrity of data blocks stored in data center. Our scheme supports quick public data integrity verification and chunk redundancy strategy. Compared with the existing scheme, it takes the advantage of ocean data support and high performance. 展开更多
关键词 cloud computing data verifiability data center data interity
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部